Amazon cover image
Image from Amazon.com

Information assurance and security : book 1 / Jake R. Pomperada and Jason V. Castellano

By: Contributor(s): Material type: TextTextPublication details: Manila : Unlimited Books Library Services & Publishing Inc., c2023Description: xii, 131 pages : illustration ; 26cmISBN:
  • 978-621-427-149-8
Subject(s): LOC classification:
  • FIL QA 76.9 .P66 2023 c.1
Contents:
Chapter 1. Introduction to cyber security threats in information security -- Chapter 2. Computer security -- Chapter 3. Operating system security -- Chapter 4. Database security and integrity -- Chapter 5. Encyption techniques -- Chapter 6. Digital signitures and authorization protocols -- Chapter 7. IP and web security.
Summary: This boos is written for readers with a range of technical backgrounds, from students to professionals.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Home library Collection Shelving location Call number Status Date due Barcode
Filipiniana Filipiniana NU BALIWAG NU BALIWAG Information Technology Filipiniana FIL QA 76.9 .P66 2023 c.1 (Browse shelf(Opens below)) Available NUBUL000004866
Browsing NU BALIWAG shelves, Shelving location: Filipiniana, Collection: Information Technology Close shelf browser (Hides shelf browser)
FIL QA 76.9 .A25 .I54 2022 c.1 Information assurance and security 1 & 2 / FIL QA 76.9 .A43 .O94 2022 c.1 Outcomes based practical guide to thesis and capstone project writing in computing / FIL QA 76.9 .D3 .I58 2019 Introduction to database using microsoft access FIL QA 76.9 .P66 2023 c.1 Information assurance and security : book 1 / FIL QA 76.9 .R48 2023 c.1 Introduction to human computer interaction / FIL QA 76.9 .R48c 2023 c.1 Computer fundamentals / FIL QA 76.9 .S88 .E87 2021 Essentials of human computer interaction /

Include references.

Chapter 1. Introduction to cyber security threats in information security -- Chapter 2. Computer security -- Chapter 3. Operating system security -- Chapter 4. Database security and integrity -- Chapter 5. Encyption techniques -- Chapter 6. Digital signitures and authorization protocols -- Chapter 7. IP and web security.

This boos is written for readers with a range of technical backgrounds, from students to professionals.

There are no comments on this title.

to post a comment.

© 2023 NU LIBRARY BALIWAG. All rights reserved. Privacy Policy I Powered by: KOHA